Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Jul 28 21:32:36 charon 15[MGR] checkin and destroy of IKE_SA successful
- Jul 28 21:32:36 charon 15[IKE] <244> IKE_SA (unnamed)[244] state change: CONNECTING => DESTROYING
- Jul 28 21:32:36 charon 15[MGR] <244> checkin and destroy IKE_SA (unnamed)[244]
- Jul 28 21:32:36 charon 15[JOB] <244> deleting half open IKE_SA with <CLIENT IP ADDRESS> after timeout
- Jul 28 21:32:36 charon 15[MGR] IKE_SA (unnamed)[244] successfully checked out
- Jul 28 21:32:36 charon 15[MGR] checkout IKEv2 SA with SPIs 87d02561ab3db013_i f9aed31554a0e7a4_r
- Jul 28 21:32:06 charon 01[MGR] <244> checkin of IKE_SA successful
- Jul 28 21:32:06 charon 01[MGR] <244> checkin IKE_SA (unnamed)[244]
- Jul 28 21:32:06 charon 01[NET] <244> sending packet: from <PFSENSE IP ADDRESS>[500] to <CLIENT IP ADDRESS>[500] (481 bytes)
- Jul 28 21:32:06 charon 01[ENC] <244> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(CHDLESS_SUP) N(MULT_AUTH) ]
- Jul 28 21:32:06 charon 01[IKE] <244> sending cert request for "CN=<PFSENSE IP ADDRESS>"
- Jul 28 21:32:06 charon 01[IKE] <244> remote host is behind NAT
- Jul 28 21:32:06 charon 01[LIB] <244> size of DH secret exponent: 2047 bits
- Jul 28 21:32:06 charon 01[CFG] <244> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
- Jul 28 21:32:06 charon 01[CFG] <244> configured proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
- Jul 28 21:32:06 charon 01[CFG] <244> received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_2048
- Jul 28 21:32:06 charon 01[CFG] <244> proposal matches
- Jul 28 21:32:06 charon 01[CFG] <244> selecting proposal:
- Jul 28 21:32:06 charon 01[CFG] <244> no acceptable INTEGRITY_ALGORITHM found
- Jul 28 21:32:06 charon 01[CFG] <244> selecting proposal:
- Jul 28 21:32:06 charon 01[IKE] <244> IKE_SA (unnamed)[244] state change: CREATED => CONNECTING
- Jul 28 21:32:06 charon 01[IKE] <244> <CLIENT IP ADDRESS> is initiating an IKE_SA
- Jul 28 21:32:06 charon 01[ENC] <244> received unknown vendor ID: 01:52:8b:bb:c0:06:96:12:18:49:ab:9a:1c:5b:2a:51:00:00:00:02
- Jul 28 21:32:06 charon 01[IKE] <244> received Vid-Initial-Contact vendor ID
- Jul 28 21:32:06 charon 01[IKE] <244> received MS-Negotiation Discovery Capable vendor ID
- Jul 28 21:32:06 charon 01[IKE] <244> received MS NT5 ISAKMPOAKLEY v9 vendor ID
- Jul 28 21:32:06 charon 01[CFG] <244> found matching ike config: <PFSENSE IP ADDRESS>...%any with prio 1052
- Jul 28 21:32:06 charon 01[CFG] <244> candidate: <PFSENSE IP ADDRESS>...%any, prio 1052
- Jul 28 21:32:06 charon 01[CFG] <244> candidate: %any...%any, prio 24
- Jul 28 21:32:06 charon 01[CFG] <244> looking for an IKEv2 config for <PFSENSE IP ADDRESS>...<CLIENT IP ADDRESS>
- Jul 28 21:32:06 charon 01[ENC] <244> parsed IKE_SA_INIT request 0 [ SA KE No N(FRAG_SUP) N(NATD_S_IP) N(NATD_D_IP) V V V V ]
- Jul 28 21:32:06 charon 01[NET] <244> received packet: from <CLIENT IP ADDRESS>[500] to <PFSENSE IP ADDRESS>[500] (632 bytes)
- Jul 28 21:32:06 charon 01[MGR] created IKE_SA (unnamed)[244]
- Jul 28 21:32:06 charon 01[MGR] checkout IKEv2 SA by message with SPIs 87d02561ab3db013_i 0000000000000000_r
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement